


default search action
14th WASA 2019: Honolulu, HI, USA
- Edoardo S. Biagioni, Yao Zheng, Siyao Cheng:

Wireless Algorithms, Systems, and Applications - 14th International Conference, WASA 2019, Honolulu, HI, USA, June 24-26, 2019, Proceedings. Lecture Notes in Computer Science 11604, Springer 2019, ISBN 978-3-030-23596-3
Full Papers
- Qianwen An, Tao Jing, Yingkun Wen, Zhuojun Duan, Yan Huo:

Decomposable Atomic Norm Minimization Channel Estimation for Millimeter Wave MIMO-OFDM Systems. 3-15 - Ran Bi

, Jiankang Ren, Hao Wang, Qian Liu, Shan Huang:
Model Based Adaptive Data Acquisition for Internet of Things. 16-28 - Di Cao, Jing-run Jia, Min-jie Xie, Yanjing Lei, Wei Lee:

Hybrid Low Frequency Electromagnetic Field and Solar Energy Harvesting Architecture for Self-Powered Wireless Sensor System. 29-42 - Cheng Chang, Huaxin Li, Yichi Zhang, Suguo Du, Hui Cao, Haojin Zhu

:
Automated and Personalized Privacy Policy Extraction Under GDPR Consideration. 43-54 - Lin Chen, Xiaoshuang Xing

, Gaofei Sun, Jin Qian, Xin Guan:
Cooperative BSM Dissemination in DSRC/WAVE Based Vehicular Networks. 55-66 - Na Dang, Xiaowu Liu, Jiguo Yu, Xiaowei Zhang:

TIDS: Trust Intrusion Detection System Based on Double Cluster Heads for WSNs. 67-83 - Ningzhi Deng, Shaojiang Deng, Chunqiang Hu, Kaiwen Lei:

An Efficient Revocable Attribute-Based Signcryption Scheme with Outsourced Designcryption in Cloud Computing. 84-97 - Son Dinh, Hang Liu, Feng Ouyang:

Massive MIMO Cognitive Cooperative Relaying. 98-110 - Zhaoquan Gu, Yuexuan Wang, Yijie Wu, Yongcai Wang

, Yueming Wang:
Minimum Control Cost of Weighted Linear Dynamic Networks. 111-123 - Yan Huang

, Zhipeng Cai
, Anu G. Bourgeois:
Privacy Protection for Context-Aware Services: A Two-Layer Three-Party Game Model. 124-136 - Qiwei Jia, Lu Zhou, Huaxin Li, Ruoxu Yang, Suguo Du, Haojin Zhu

:
Who Leaks My Privacy: Towards Automatic and Association Detection with GDPR Compliance. 137-148 - Chunlei Li, Qian Wu, Hewu Li, Jun Liu

:
Trustroam: A Novel Blockchain-Based Cross-Domain Authentication Scheme for Wi-Fi Access. 149-161 - Feng Li, Huan Yang, Yifei Zou, Dongxiao Yu, Jiguo Yu:

Joint Optimization of Routing and Storage Node Deployment in Heterogeneous Wireless Sensor Networks Towards Reliable Data Storage. 162-174 - Min Li, Yao Chen, Yanfang Zhang, Jian Yang, Hong Du:

Fusing RFID and Computer Vision for Occlusion-Aware Object Identifying and Tracking. 175-187 - Ye Li, Guangqiang Yin, Shaoqi Hou, Jianhai Cui, Zicheng Huang:

Spatiotemporal Feature Extraction for Pedestrian Re-identification. 188-200 - Qixiao Lin, Jian Mao, Futian Shi, Shishi Zhu, Zhenkai Liang:

Detecting Android Side Channel Probing Attacks Based on System States. 201-212 - Liuyan Liu, Haoqiang Huang

, Haisheng Tan, Wanli Cao, Panlong Yang, Xiang-Yang Li:
Online DAG Scheduling with On-Demand Function Configuration in Edge Computing. 213-224 - Bin Ma, Yubin Zhao, Xiaofan Li, Yuefeng Ji, Cheng-Zhong Xu

:
Magnetic Beamforming Algorithm for Hybrid Relay and MIMO Wireless Power Transfer. 225-234 - Shengchao Ma, Jinghua Zhu:

Self-attention Based Collaborative Neural Network for Recommendation. 235-246 - Yuwen Pu, Ying Wang, Feihong Yang, Jin Luo, Chunqiang Hu, Haibo Hu:

An Efficient and Recoverable Data Sharing Mechanism for Edge Storage. 247-259 - Letu Qingge, Peng Zou, Lihui Dai, Qing Yang, Binhai Zhu:

Trajectory Comparison in a Vehicular Network II: Eliminating the Redundancy. 260-271 - Xuebin Ren, Shuyang Wang, Xianghua Yao, Chia-Mu Yu, Wei Yu

, Xinyu Yang:
Differentially Private Event Sequences over Infinite Streams with Relaxed Privacy Guarantee. 272-284 - Mohammed Sarkhi

, Abdulsahib Albehadili
, Osama Hussein, Ahmad Y. Javaid, Vijay Kumar Devabhaktuni:
Performance Investigation of Polar Codes over Nakagami-M Fading and Real Wireless Channel Measurements. 285-296 - Dian Shi

, Xuanheng Li
, Ming Li
, Jie Wang
, Pan Li
, Miao Pan
:
Optimal Transportation Network Company Vehicle Dispatching via Deep Deterministic Policy Gradient. 297-309 - Korn Sooksatra, Ruinian Li, Yingshu Li

, Xin Guan, Wei Li:
Fairness-Aware Auction Mechanism for Sustainable Mobile Crowdsensing. 310-321 - Hao Wang:

Evolutionary Game Based Gateway Selection Algorithm in Cyber-Physical System. 322-334 - Yawei Wang, Donghui Chen, Cheng Zhang, Xi Chen

, Baogui Huang, Xiuzhen Cheng:
Wide and Recurrent Neural Networks for Detection of False Data Injection in Smart Grids. 335-345 - Yucheng Wang, Xu Wang, Hongsong Zhu, Hai Zhao, Hong Li, Limin Sun:

ONE-Geo: Client-Independent IP Geolocation Based on Owner Name Extraction. 346-357 - Qianwen Wei, Shujun Li, Wei Li, Hong Li, Mingsheng Wang:

Decentralized Hierarchical Authorized Payment with Online Wallet for Blockchain. 358-369 - Ke Xiao, Chaofei Li, Yunhua He, Chao Wang, Wei Cheng:

A Location Predictive Model Based on 2D Angle Data for HAPS Using LSTM. 370-381 - Juan Xu, Xingxin Xu, Xu Ding, Lei Shi, Yang Lu:

Cross-Layer Optimization on Charging Strategy for Wireless Sensor Networks Based on Successive Interference Cancellation. 382-394 - Linyan Xu, Zhangjie Fu, Liran Ma

:
An Integrated UAV Platform for Real-Time and Efficient Environmental Monitoring. 395-406 - Shuaijing Xu, Guangzhi Zhang, Rongfang Bie, Anton Kos:

CXNet-m2: A Deep Model with Visual and Clinical Contexts for Image-Based Detection of Multiple Lesions. 407-418 - Xiaohua Xu, Yuanfang Chen, Shuibing He, Patrick Otoo Bobbie:

OWLS: Opportunistic Wireless Link Scheduling with SINR Constraints. 419-431 - Xiaohua Xu, Yi Zhao, Dongfang Zhao, Lei Yang, Spiridon Bakiras

:
Distributed Real-Time Data Aggregation Scheduling in Duty-Cycled Multi-hop Sensor Networks. 432-444 - Biao Yu, Yingwen Chen, Shaojing Fu, Wanrong Yu, Xiaoli Guo:

Building Trustful Crowdsensing Service on the Edge. 445-457 - Cheng Zhang, Honglu Jiang

, Yawei Wang, Qin Hu, Jiguo Yu, Xiuzhen Cheng:
User Identity De-anonymization Based on Attributes. 458-469 - Di Zhang, Qiang Niu, Xingbao Qiu:

Detecting Anomalies in Communication Packet Streams Based on Generative Adversarial Networks. 470-481 - Peng Zhang, Xu Ding, Jing Wang, Juan Xu:

Multi-hop Wireless Recharging Sensor Networks Optimization with Successive Interference Cancellation. 482-494 - Jinghua Zhu, Xu Guo:

Deep Neural Model for Point-of-Interest Recommendation Fused with Graph Embedding Representation. 495-506 - Weiping Zhu, Hang Gao, Zongjian He, Jiangbo Qin, Bo Han:

A Hybrid Approach for Recognizing Web Crawlers. 507-519 - Zhenyu Zhu, Liusheng Huang, Hongli Xu:

Contextual Combinatorial Cascading Thompson Sampling. 520-532 - Peng Zou, Letu Qingge, Qing Yang, Binhai Zhu:

Trajectory Comparison in a Vehicular Network I: Computing a Consensus Trajectory. 533-544
Short Papers
- Ran Bi

, Jiankang Ren, Hao Wang, Qian Liu, Xiuyuan Yang:
Utility Aware Task Offloading for Mobile Edge Computing. 547-555 - Shasha Chen, Shengling Wang, Jianghui Huang:

Analysis of Best Network Routing Structure for IoT. 556-563 - Yuqi Fan, Liming Wang, Lei Shi, Ding-Zhu Du:

Parallel Multicast Information Propagation Based on Social Influence. 564-572 - Weiqing Huang, Yan Li, Dong Wei, Qiaoyu Zhang:

Research on Physical Layer Security Scheme Based on OAM - Modulation for Wireless Communications. 573-586 - Liu Hui, Shengling Wang:

Optimal Routing of Tight Optimal Bidirectional Double-Loop Networks. 587-595 - Li Li, Hui Xia, Rui Zhang, Ye Li:

DDSEIR: A Dynamic Rumor Spreading Model in Online Social Networks. 596-604 - Zhenchun Wei, Jie Pan, Kangkang Wang, Lei Shi, Zengwei Lyu, Lin Feng:

Data Forwarding and Caching Strategy for RSU Aided V-NDN. 605-612 - Hui Wen, Weidong Zhang, Yan Hu, Qing Hu, Hongsong Zhu, Limin Sun:

Lightweight IoT Malware Visualization Analysis via Two-Bits Networks. 613-621 - Yunpeng Wu, Shukui Zhang, Yuren Yang, Yang Zhang, Li Zhang, Hao Long:

Privacy Protection Sensing Data Aggregation for Crowd Sensing. 622-630 - Changsong Yang

, Xiaoling Tao, Feng Zhao
, Yong Wang:
A New Outsourced Data Deletion Scheme with Public Verifiability. 631-638 - Xueling Zhou, Lingbo Wei, Yukun Niu, Chi Zhang, Yuguang Fang

:
DPSR: A Differentially Private Social Recommender System for Mobile Users. 639-646

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














